CVE-2025-30042
Received Received - Intake
Authentication Bypass in CGM CLININET via Certificate Number Exposure

Publication date: 2026-03-02

Last updated on: 2026-03-09

Assigner: CERT.PL

Description
The CGM CLININET system provides smart card authentication; however, authentication is conducted locally on the client device, and, in reality, only the certificate number is used for access verification. As a result, possession of the certificate number alone is sufficient for authentication, regardless of the actual presence of the smart card or ownership of the private key.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-02
Last Modified
2026-03-09
Generated
2026-05-07
AI Q&A
2026-03-02
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
cgm clininet to 2025.ms2 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-603 A client/server product performs authentication within client code but not in server code, allowing server-side authentication to be bypassed via a modified client that omits the authentication check.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The CGM CLININET system uses smart card authentication, but the authentication process is flawed because it is performed locally on the client device and relies solely on the certificate number for access verification.

This means that anyone who possesses the certificate number can authenticate successfully, even if they do not have the actual smart card or the private key associated with it.


How can this vulnerability impact me? :

This vulnerability allows unauthorized users to gain access to the CGM CLININET system simply by knowing a valid certificate number, bypassing the intended smart card and private key authentication mechanisms.

Such unauthorized access can lead to potential data breaches, unauthorized viewing or modification of sensitive clinical, administrative, and diagnostic information, and compromise the integrity and confidentiality of hospital data.

Given the high CVSS score of 9.0, the impact is severe, indicating a high likelihood of exploitation with significant consequences.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

I don't know


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart